niversiteit van Amsterdam
System and Network Engineering
Overview Introduction Background Target Application Vulnerability - - PowerPoint PPT Presentation
niversiteit van Amsterdam System and Network Engineering E ffectiveness of A utomated A pplication P enetration T esting T ools A LEXANDRE F ERREIRA H ARALD K LEPPE Overview Introduction Background Target Application Vulnerability
System and Network Engineering
– What and how is automated with these tools? – How much manual intervention is required from the
results? (false positives / negatives)
– What are the most effective tools? – What level of effectiveness is acceptable / necessary
to properly support pentesters?
– Other tools (HacmeBank, WebGoat, ...) – Known implementations
– Lets have a look!
– In URL and in HTML form
– Stored and relected
– Both open source and commercial tools – Established tools – New players – Some tools: €10 000 per year
Vulnerability Type Tools Path traversal CSRF Reflected XSS Stored XSS Failure to restrict URL access SQL Injection (in URL) SQL Injection (in HTML form) Printed error message Commercial Commercial Commercial Commercial Commercial Commercial Open Source Commercial Commercial Open Source Open Source Open Source
– Crawling abilities of different scanners – Selective scanning